{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T01:58:06Z","timestamp":1773367086020,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100005710","name":"Universiti Teknologi Petronas","doi-asserted-by":"publisher","award":["015LCO-171"],"award-info":[{"award-number":["015LCO-171"]}],"id":[{"id":"10.13039\/501100005710","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00786-9","type":"journal-article","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T07:02:07Z","timestamp":1702018927000},"page":"1197-1213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0701-6761","authenticated-orcid":false,"given":"Rao","family":"Faizan Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2496-1311","authenticated-orcid":false,"given":"P. D. D.","family":"Dominic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1708-9657","authenticated-orcid":false,"given":"Sadaf","family":"Hina","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3224-9164","authenticated-orcid":false,"given":"Sheraz","family":"Naseer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,8]]},"reference":[{"issue":"1","key":"786_CR1","first-page":"28","volume":"17","author":"H Abdul Hamid","year":"2019","unstructured":"Abdul Hamid, H., Mohd Dali, N.: Curbing misbehaviour with information security measures: an empirical evidence from a case study. AL-ABQARI: J. Islam. Soc. Sci. Human. 17(1), 28\u201338 (2019)","journal-title":"AL-ABQARI: J. Islam. Soc. Sci. Human."},{"issue":"2","key":"786_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process.Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process.Behav. Hum. Decis. Process."},{"issue":"6","key":"786_CR3","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.cose.2009.01.003","volume":"28","author":"E Albrechtsen","year":"2009","unstructured":"Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. Secur. 28(6), 476\u2013490 (2009). https:\/\/doi.org\/10.1016\/j.cose.2009.01.003","journal-title":"Comput. Secur. Secur."},{"issue":"4","key":"786_CR4","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.cose.2009.12.005","volume":"29","author":"E Albrechtsen","year":"2010","unstructured":"Albrechtsen, E., Hovden, J.: Improving information security awareness and behaviour through dialogue, participation and collective reflection: an intervention study. Comput. Secur. 29(4), 432\u2013445 (2010). https:\/\/doi.org\/10.1016\/j.cose.2009.12.005","journal-title":"Comput. Secur."},{"issue":"20","key":"786_CR5","doi-asserted-by":"publisher","first-page":"8576","DOI":"10.3390\/su12208576","volume":"12","author":"RF Ali","year":"2020","unstructured":"Ali, R.F., Dominic, P., Ali, K.: Organizational governance, social bonds and information security policy compliance: a perspective towards oil and gas employees. Sustainability 12(20), 8576 (2020)","journal-title":"Sustainability"},{"issue":"8","key":"786_CR6","doi-asserted-by":"publisher","first-page":"3383","DOI":"10.3390\/app11083383","volume":"11","author":"RF Ali","year":"2021","unstructured":"Ali, R.F., Dominic, P., Ali, S.E.A., Rehman, M., Sohail, A.: Information security behavior and information security policy compliance: a systematic literature review for identifying the transformation process from noncompliance to compliance. Appl. Sci. 11(8), 3383 (2021)","journal-title":"Appl. Sci."},{"key":"786_CR7","doi-asserted-by":"crossref","unstructured":"Alnatheer, M. A.: Information security culture critical success factors. Paper presented at the 2015 12th International Conference on Information Technology-New Generations (2015)","DOI":"10.1109\/ITNG.2015.124"},{"issue":"3","key":"786_CR8","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"JC Anderson","year":"1988","unstructured":"Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: a review and recommended two-step approach. Psychol. Bull. 103(3), 411 (1988)","journal-title":"Psychol. Bull."},{"issue":"1","key":"786_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.shaw.2017.05.001","volume":"9","author":"LIV Bergh","year":"2018","unstructured":"Bergh, L.I.V., Leka, S., Zwetsloot, G.: Tailoring psychosocial risk assessment in the oil and gas industry by exploring specific and common psychosocial risks. Saf. Health Work. Health Work 9(1), 63\u201370 (2018)","journal-title":"Saf. Health Work. Health Work"},{"issue":"2","key":"786_CR10","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1086\/208856","volume":"8","author":"BJ Calder","year":"1981","unstructured":"Calder, B.J., Phillips, L.W., Tybout, A.M.: Designing research for application. J. Consum. Res. Consum. Res. 8(2), 197\u2013207 (1981)","journal-title":"J. Consum. Res. Consum. Res."},{"issue":"3","key":"786_CR11","first-page":"11","volume":"55","author":"Y Chen","year":"2015","unstructured":"Chen, Y., Ramamurthy, K., Wen, K.-W.: Impacts of comprehensive information security programs on information security culture. J. Comput. Inf. Syst. Comput. Inf. Syst. 55(3), 11\u201319 (2015)","journal-title":"J. Comput. Inf. Syst. Comput. Inf. Syst."},{"issue":"7","key":"786_CR12","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cose.2013.09.009","volume":"39","author":"L Cheng","year":"2013","unstructured":"Cheng, L., Li, Y., Li, W., Holm, E., Zhai, Q.: Understanding the violation of IS security policy in organizations: an integrated model based on social control and deterrence theory. Comput. Secur. 39(7), 447\u2013459 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.09.009","journal-title":"Comput. Secur."},{"key":"786_CR13","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/978-3-540-32827-8_29","volume-title":"Handbook of Partial Least Squares","author":"WW Chin","year":"2010","unstructured":"Chin, W.W.: How to write up and report PLS analyses. In: Esposito Vinzi, V., Chin, W., Henseler, J., Wang, H. (eds.) Handbook of Partial Least Squares, pp. 655\u2013690. Springer, Berlin (2010)"},{"issue":"1","key":"786_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D'Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20(1), 79\u201398 (2009). https:\/\/doi.org\/10.1287\/isre.1070.0160","journal-title":"Inf. Syst. Res."},{"key":"786_CR15","unstructured":"Da Veiga, A.: The influence of information security policies on information security culture: illustrated through a case study. Paper presented at the Proceedings of Ninth international Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (2015)"},{"issue":"3","key":"786_CR16","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.cose.2017.05.002","volume":"70","author":"A Da Veiga","year":"2017","unstructured":"Da Veiga, A., Martins, N.: Defining and identifying dominant information security cultures and subcultures. Comput. Secur. 70(3), 72\u201394 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.05.002","journal-title":"Comput. Secur."},{"issue":"1","key":"786_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3758\/BF03203630","volume":"28","author":"E Erdfelder","year":"1996","unstructured":"Erdfelder, E., Faul, F., Buchner, A.: GPOWER: A general power analysis program. Behav. Res. Methods Instrum. Comput.. Res. Methods Instrum. Comput. 28(1), 1\u201311 (1996)","journal-title":"Behav. Res. Methods Instrum. Comput.. Res. Methods Instrum. Comput."},{"issue":"1","key":"786_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11648\/j.ajtas.20160501.11","volume":"5","author":"I Etikan","year":"2016","unstructured":"Etikan, I., Musa, S.A., Alkassim, R.S.: Comparison of convenience sampling and purposive sampling. Am. J. Theor. Appl. Stat.Theor. Appl. Stat. 5(1), 1\u20134 (2016)","journal-title":"Am. J. Theor. Appl. Stat.Theor. Appl. Stat."},{"issue":"3","key":"786_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1361-3723(12)70053-2","volume":"2012","author":"S Furnell","year":"2012","unstructured":"Furnell, S., Rajendran, A.: Understanding the influences on information security behaviour. Comput. Fraud Secur. 2012(3), 12\u201315 (2012). https:\/\/doi.org\/10.1016\/S1361-3723(12)70053-2","journal-title":"Comput. Fraud Secur."},{"key":"786_CR20","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/23044042","volume":"35","author":"D Gefen","year":"2011","unstructured":"Gefen, D., Rigdon, E.E., Straub, D.: Editor\u2019s comments: an update and extension to SEM guidelines for administrative and social science research. MIS Q. 35, iii\u2013xiv (2011)","journal-title":"MIS Q."},{"issue":"2","key":"786_CR21","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1111\/isj.12257","volume":"30","author":"KL Gwebu","year":"2019","unstructured":"Gwebu, K.L., Wang, J., Hu, M.Y.: Information security policy noncompliance: an integrative social influence model. Inf. Syst. J. 30(2), 1350\u20131917 (2019). https:\/\/doi.org\/10.1111\/isj.12257","journal-title":"Inf. Syst. J."},{"key":"786_CR22","volume-title":"Multivariate Data Analysis","author":"JF Hair","year":"2010","unstructured":"Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E., Tatham, R.L.: Multivariate Data Analysis, 7th edn. Hoboken, Pearson Prentice Hall (2010)","edition":"7"},{"issue":"2","key":"786_CR23","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","volume":"19","author":"JF Hair","year":"2011","unstructured":"Hair, J.F., Ringle, C.M., Sarstedt, M.: PLS-SEM: indeed a silver bullet. J. Mark. Theory Pract. 19(2), 139\u2013152 (2011)","journal-title":"J. Mark. Theory Pract."},{"key":"786_CR24","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"JF Hair Jr","year":"2017","unstructured":"Hair, J.F., Jr., Hult, G.T.M., Ringle, C., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), vol. 2, 2nd edn. Sage Publications, Thousand Oaks (2017)","edition":"2"},{"issue":"1","key":"786_CR25","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler, J., Ringle, C.M., Sarstedt, M.: A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 43(1), 115\u2013135 (2015)","journal-title":"J. Acad. Mark. Sci."},{"key":"786_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101594","volume":"87","author":"S Hina","year":"2019","unstructured":"Hina, S., Selvam, D.D.D.P., Lowry, P.B.: Institutional governance and protection motivation: theoretical insights into shaping employees\u2019 security compliance behavior in higher education institutions in the developing world. Comput. Secur. 87, 101594 (2019)","journal-title":"Comput. Secur."},{"key":"786_CR27","volume-title":"Social bond theory. Criminological theory: past to present","author":"T Hirschi","year":"1998","unstructured":"Hirschi, T.: Social bond theory. Criminological theory: past to present. Roxbury, Los Angeles (1998)"},{"issue":"2","key":"786_CR28","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1287\/isre.2015.0569","volume":"26","author":"JS-C Hsu","year":"2015","unstructured":"Hsu, J.S.-C., Shih, S.-P., Hung, Y.W., Lowry, P.B.: The role of extra-role behaviors and social controls in information security policy effectiveness. Inf. Syst. Res. 26(2), 282\u2013300 (2015)","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"786_CR29","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur.31(1), 83\u201395 (2012)","journal-title":"Comput. Secur."},{"issue":"1","key":"786_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","volume":"51","author":"P Ifinedo","year":"2014","unstructured":"Ifinedo, P.: Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition. Inf. Manag. 51(1), 69\u201379 (2014)","journal-title":"Inf. Manag."},{"issue":"1","key":"786_CR31","doi-asserted-by":"publisher","first-page":"53","DOI":"10.4018\/IRMJ.2018010103","volume":"31","author":"P Ifinedo","year":"2018","unstructured":"Ifinedo, P.: Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions. Inf. Resour. Manag. J.Resour. Manag. J. 31(1), 53\u201382 (2018)","journal-title":"Inf. Resour. Manag. J.Resour. Manag. J."},{"issue":"1\u20132","key":"786_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ijcip.2009.02.004","volume":"2","author":"MG Jaatun","year":"2009","unstructured":"Jaatun, M.G., Albrechtsen, E., Line, M.B., T\u00f8ndel, I.A., Longva, O.H.: A framework for incident response management in the petroleum industry. Int. J. Crit. Infrastruct. Prot.Infrastruct. Prot. 2(1\u20132), 26\u201337 (2009)","journal-title":"Int. J. Crit. Infrastruct. Prot.Infrastruct. Prot."},{"issue":"1","key":"786_CR33","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1177\/1460458219832048","volume":"26","author":"SR Kessler","year":"2020","unstructured":"Kessler, S.R., Pindek, S., Kleinman, G., Andel, S.A., Spector, P.E.: Information security climate and the assessment of information security risk among healthcare employees. Health Inform. J. 26(1), 461\u2013473 (2020)","journal-title":"Health Inform. J."},{"key":"786_CR34","volume-title":"Principles and Practice of Structural Equation Modeling","author":"RB Kline","year":"2015","unstructured":"Kline, R.B.: Principles and Practice of Structural Equation Modeling. Guilford Publications, New York (2015)"},{"issue":"7","key":"786_CR35","first-page":"1","volume":"13","author":"N Kock","year":"2012","unstructured":"Kock, N., Lynn, G.: Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations. J. Assoc. Inf. Syst. 13(7), 1\u201340 (2012)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"3","key":"786_CR36","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.compind.2019.06.007","volume":"111","author":"H Lu","year":"2019","unstructured":"Lu, H., Guo, L., Azimi, M., Huang, K.: Oil and Gas 4.0 era: a systematic review and outlook. Comput. Ind.. Ind. 111(3), 68\u201390 (2019). https:\/\/doi.org\/10.1016\/j.compind.2019.06.007","journal-title":"Comput. Ind.. Ind."},{"issue":"3","key":"786_CR37","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1037\/met0000144","volume":"23","author":"D McNeish","year":"2018","unstructured":"McNeish, D.: Thanks coefficient alpha, we\u2019ll take it from here. Psychol. Methods 23(3), 412\u2013433 (2018)","journal-title":"Psychol. Methods"},{"issue":"March","key":"786_CR38","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.chb.2018.10.031","volume":"92","author":"MI Merhi","year":"2019","unstructured":"Merhi, M.I., Ahluwalia, P.: Examining the impact of deterrence factors and norms on resistance to information systems security. Comput. Hum. Behav.. Hum. Behav. 92(March), 37\u201346 (2019)","journal-title":"Comput. Hum. Behav.. Hum. Behav."},{"issue":"11","key":"786_CR39","doi-asserted-by":"publisher","first-page":"1882","DOI":"10.3390\/sym12111882","volume":"12","author":"S Naseer","year":"2020","unstructured":"Naseer, S., Faizan Ali, R., Dominic, P., Saleem, Y.: Learning representations of network traffic using deep neural networks for network anomaly detection: a perspective towards oil and gas IT infrastructures. Symmetry 12(11), 1882 (2020)","journal-title":"Symmetry"},{"issue":"2","key":"786_CR40","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1108\/ITP-08-2016-0198","volume":"31","author":"EG Ochieng","year":"2018","unstructured":"Ochieng, E.G., Ovbagbedia, O.O., Zuofa, T., Abdulai, R., Matipa, W., Ruan, X., Oledinma, A.: Utilising a systematic knowledge management based system to optimise project management operations in oil and gas organisations. Inf. Technol. People 31(2), 527\u2013556 (2018)","journal-title":"Inf. Technol. People"},{"key":"786_CR41","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014)","journal-title":"Comput. Secur."},{"key":"786_CR42","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1108\/ICS-04-2018-0048","volume":"27","author":"QS Qassim","year":"2019","unstructured":"Qassim, Q.S., Jamil, N., Daud, M., Patel, A., Jaaffar, N.: A review of security assessment methodologies in industrial control systems. Inf. Comput. Secur. 27, 47\u201361 (2019)","journal-title":"Inf. Comput. Secur."},{"issue":"8","key":"786_CR43","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/j.cose.2012.09.001","volume":"31","author":"Y Qian","year":"2012","unstructured":"Qian, Y., Fang, Y., Gonzalez, J.J.: Managing information security risks during new technology adoption. Comput. Secur. 31(8), 859\u2013869 (2012)","journal-title":"Comput. Secur."},{"key":"786_CR44","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.cose.2018.09.016","volume":"80","author":"M Rajab","year":"2019","unstructured":"Rajab, M., Eydgahi, A.: Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Comput. Secur. 80, 211\u2013223 (2019)","journal-title":"Comput. Secur."},{"key":"786_CR45","unstructured":"Ramayah, T., Cheah, J., Chuah, F., Ting, H., Memon, M.A.: Partial least squares structural equation modeling (PLS-SEM) using smartPLS 3.0 Handbook of Market Research. In: 2nd edn Kuala Lumpur: Pearson Malaysia Sdn Bhd (2018)"},{"issue":"1","key":"786_CR46","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Intern. Comput. 16(1), 69\u201373 (2012)","journal-title":"IEEE Intern. Comput."},{"key":"786_CR47","unstructured":"Ringle, C., Wende, S., & Becker, J. (2019). SmartPLS 3. Retrieved from http:\/\/www.smartpls.com"},{"key":"786_CR48","doi-asserted-by":"crossref","unstructured":"Ruhwanya, Z., & Ophoff, J. (2019). Information security culture assessment of small and medium-sized enterprises in Tanzania. Paper presented at the International Conference on Social Implications of Computers in Developing Countries.","DOI":"10.1007\/978-3-030-18400-1_63"},{"issue":"5","key":"786_CR49","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.future.2019.03.024","volume":"97","author":"NS Safa","year":"2019","unstructured":"Safa, N.S., Maple, C., Furnell, S., Azad, M.A., Perera, C., Dabbagh, M., Sookhak, M.: Deterrence and prevention-based model to mitigate information security insider threats in organisations. Fut. Gener. Comput. Syst. 97(5), 587\u2013597 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.03.024","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"June","key":"786_CR50","first-page":"247","volume":"40","author":"NS Safa","year":"2018","unstructured":"Safa, N.S., Maple, C., Watson, T., Von Solms, R.: Motivation and opportunity based model to reduce information security insider threats in organisations. J. Inf. Secur. Appl. 40(June), 247\u2013257 (2018)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"786_CR51","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","volume":"56","author":"NS Safa","year":"2016","unstructured":"Safa, N.S., Von Solms, R., Furnell, S.: Information security policy compliance model in organizations. Comput. Secur. 56(1), 70\u201382 (2016)","journal-title":"Comput. Secur."},{"key":"786_CR52","volume-title":"Research Methods for Business: A Skill Building Approach","author":"U Sekaran","year":"2016","unstructured":"Sekaran, U., Bougie, R.: Research Methods for Business: A Skill Building Approach. Wiley, New York (2016)"},{"issue":"1","key":"786_CR53","doi-asserted-by":"publisher","first-page":"128440","DOI":"10.1109\/ACCESS.2020.3007960","volume":"8","author":"G Stergiopoulos","year":"2020","unstructured":"Stergiopoulos, G., Gritzalis, D.A., Limnaios, E.: Cyber-attacks on the Oil & Gas sector: a survey on incident assessment and attack patterns. IEEE Access 8(1), 128440\u2013128475 (2020)","journal-title":"IEEE Access"},{"key":"786_CR54","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.cose.2019.01.011","volume":"83","author":"G Tsakalidis","year":"2019","unstructured":"Tsakalidis, G., Vergidis, K., Petridou, S., Vlachopoulou, M.: A cybercrime incident architecture with adaptive response policy. Comput. Secur. 83, 22\u201337 (2019)","journal-title":"Comput. Secur."},{"issue":"2","key":"786_CR55","first-page":"5","volume":"11","author":"N Urbach","year":"2010","unstructured":"Urbach, N., Ahlemann, F.: Structural equation modeling in information systems research using partial least squares. J. Inf. Technol. Theory Appl. 11(2), 5\u201340 (2010)","journal-title":"J. Inf. Technol. Theory Appl."},{"issue":"4","key":"786_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103212","volume":"57","author":"A Vance","year":"2020","unstructured":"Vance, A., Siponen, M.T., Straub, D.W.: Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Inf. Manag. 57(4), 103212 (2020)","journal-title":"Inf. Manag."},{"issue":"December","key":"786_CR57","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.dss.2016.09.009","volume":"92","author":"A Yazdanmehr","year":"2016","unstructured":"Yazdanmehr, A., Wang, J.: Employees\u2019 information security policy compliance: a norm activation perspective. Decis. Supp. Syst. 92(December), 36\u201346 (2016)","journal-title":"Decis. Supp. Syst."},{"issue":"4","key":"786_CR58","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1108\/JFC-04-2016-0021","volume":"23","author":"KM Zakaria","year":"2016","unstructured":"Zakaria, K.M., Nawawi, A., Salin, A.S.A.P.: Internal controls and fraud\u2013empirical evidence from oil and gas company. J. Financ. Crime 23(4), 1154\u20131168 (2016)","journal-title":"J. Financ. Crime"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00786-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00786-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00786-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:41:07Z","timestamp":1711525267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00786-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,8]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["786"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00786-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,8]]},"assertion":[{"value":"6 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Authors consciously assure that, this is authors' own original work, which has not been previously published elsewhere. The paper is not currently being considered for publication elsewhere. The paper reflects the authors' own research and analysis in a truthful and complete manner. The paper properly credits the meaningful contributions of co-authors and co-researchers. The results are appropriately placed in the context of prior and existing research. The results are appropriately placed in the context of prior and existing research. All authors have been personally and actively involved in substantial work leading to the paper and will take public responsibility for its content.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical statement"}}]}}